Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things
Abstract Internet of Medical Things (IoMT) solutions have proliferated rapidly in the COVID‐
19 pandemic era. The smart medical sensors capture real‐time data from remote patients …
19 pandemic era. The smart medical sensors capture real‐time data from remote patients …
An integrated z-number and dematel-based cooperation enforcement scheme for thwarting malicious nodes in manets
SM Udhaya Sankar, N Jagadish Kumar… - Wireless Personal …, 2023 - Springer
Abstract Mobile ad hoc Networks (MANETs) represent a group of mobile nodes that
constitutes the network deprived of any pre-established infrastructure. In MANETs, the …
constitutes the network deprived of any pre-established infrastructure. In MANETs, the …
Ask-ram-imot: Autonomous shared keys based remote authentication method for internet of medical things applications
P Ramalingam, P Pabitha - Wireless Personal Communications, 2023 - Springer
Recent developments in the Internet of Things have led to the notion of the Internet of
Medical Things (IoMT) designed to enhance the standard of healthcare for user-specific …
Medical Things (IoMT) designed to enhance the standard of healthcare for user-specific …
A secure three-factor authentication protocol for e-governance system based on multiserver environments
In electronic governance (e-governance) system, citizens can access government services
such as transportation, licensing and immigration remotely over the Internet. With the …
such as transportation, licensing and immigration remotely over the Internet. With the …
Cryptanalysis of biometric based secure user authentication protocol for iot applications
P Ramalingam, P Pabitha - 2022 3rd International Conference …, 2022 - ieeexplore.ieee.org
In the 21st century various Biometric based user authentication schemes for Internet of
Things network applications are evolving. As a part, Vinoth et al. proposed an Biometric …
Things network applications are evolving. As a part, Vinoth et al. proposed an Biometric …
A password less authentication protocol for multi-server environment using physical unclonable function
E Praveen Kumar, S Priyanka - The Journal of Supercomputing, 2023 - Springer
Password-based authentication is the most commonly used method to authenticate users to
get online services. In password-based authentication, the users must remember all their …
get online services. In password-based authentication, the users must remember all their …
Secure lightweight key exchange using ECC for user-gateway paradigm
Internet of Things (IoT)-based services connect the user with sensing devices through
intermediary devices like a gateway. The authentication with secure key exchange assures …
intermediary devices like a gateway. The authentication with secure key exchange assures …
[HTML][HTML] Physical-unclonable-function-based lightweight three-factor authentication for multiserver architectures
Q **e, Y Zhao - Mathematics, 2023 - mdpi.com
To support more complex and robust online services, enterprise-class applications prefer to
interconnect multiple servers as the pedestal to enhance the system's interoperability …
interconnect multiple servers as the pedestal to enhance the system's interoperability …
A Multi Server Authentication Protocol With Integrated Monitoring for IoMT Based Healthcare System
Q **e, Y Zhao, Q **e, X Li, D He… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Internet of Medical Things based healthcare system (IoMTHS) is a kind of industrial
information system that integrates life monitoring, pathological inference and drug therapy …
information system that integrates life monitoring, pathological inference and drug therapy …
Zero-effort two-factor authentication using Wi-Fi radio wave transmission and machine learning
AAS AlQahtani, T Alshayeb - 2023 IEEE 13th Annual …, 2023 - ieeexplore.ieee.org
The proliferation of sensitive information being stored online highlights the pressing need for
secure and efficient user authentication methods. To address this issue, this paper presents …
secure and efficient user authentication methods. To address this issue, this paper presents …